You are on page 1of 6

Oracle eBusiness Database Monitoring Procedure

Document Owner: Pete Stang Published: 12/16/2020

1. Scope
This procedure details the steps taken to review the eBusiness database logging via the
DBA_Audit_Trail table.

Business Unit: GDLS -US GDLS-C


Impacted Roles: GDLS SOC
When: Weekly logging reports will be emailed to the GDLSSOC@gdls.com and
SOXemailretention@gdls.com
Exclusions: None

2. Procedures
2.1 Inputs
• Baseline spreadsheet
• Comma delimited activity file including SME designation
• PMP Generic and Shared Accounts
Example: Baseline Spreadsheet

Example: Comma Delimited File

Page 1 of 6
GDLS Sensitive – Not for distribution outside of GDLS
Printed copy valid for three (3) business days. See the process repository for current version.
Oracle eBusiness Database Monitoring Procedure Published: 12/16/2020

Example: PMP Generic and Shared Accounts

2.2 Task Steps

2.2.1 Generation of Database Log


The standard database auditing is enabled in Oracle databases with initialization
parameter set to AUDIT_TRAIL = DB. This means it writes the audit data to
SYS.AUD$ except for SYS Operations, which are always written to the operating
system audit trail location. The logons and attempted logons are being audited in
this table. The DBA_AUDIT_TRAIL displays all standard audit trails entries.

Retention period of SYS.AUD$ table is 31 days.

A comma delimited file will be emailed weekly to the GDLS SOC for reviewing
current database activity against the baseline spreadsheet for abnormalities.

2.2.2 Monitoring of Database Log


Using the baseline spreadsheet, GDLS SOC analyst will review weekly report:
• Generic and shared ID list will be reviewed to verify user access to ensure
generic and shared ID is coming from an authorized source.
• VLOOKUP function will be performed between spreadsheets to validate
development and shared ids will never be used for production, and vice
versa.
• User activity will be compared against the comma delimited file for:
 Unauthorized users
 Users switching between accounts
• Any variances from baseline spreadsheet or user activity will be discussed
with management or DBA.
• If the event is determined to be acceptable, the baseline spreadsheet will
be updated.
• If event is determined to be a security incident, refer to: Security Incident
Response Procedure

Page 2 of 6
GDLS Sensitive – Not for distribution outside of GDLS
Printed copy valid for three (3) business days. See the process repository for current version.
Oracle eBusiness Database Monitoring Procedure Published: 12/16/2020

Example: DBA_AUDIT_TRAIL Columns and Descriptions:


• Note: The comma delimited file will include only the first 3 columns.

Column NULL Description

OS_USERNAME Operating system login username of the user whose actions were audited

USERNAME Name (not ID number) of the user whose actions were audited

USERHOST Client host machine name

TERMINAL Identifier of the user's terminal

TIMESTAMP Date and time of the creation of the audit trail entry (date and time of user
login for entries created by AUDIT SESSION) in the local database session
time zone

OWNER Creator of the object affected by the action

OBJ_NAME Name of the object affected by the action

ACTION NOT Numeric action type code. The corresponding name of the action type is in
NULL the ACTION_NAME column.

ACTION_NAME Name of the action type corresponding to the numeric code in the ACTION
column

NEW_OWNER Owner of the object named in the NEW_NAME column

NEW_NAME New name of the object after a RENAME or the name of the underlying
object

OBJ_PRIVILEG Object privileges granted or revoked by a GRANT or REVOKE statement


E

SYS_PRIVILEGE System privileges granted or revoked by a GRANT or REVOKE statement

ADMIN_OPTION Indicates whether the role or system privilege was granted with the ADMIN
option

GRANTEE Name of the grantee specified in a GRANT or REVOKE statement

AUDIT_OPTION Auditing option set with the AUDIT statement

SES_ACTIONS Session summary (a string of 16 characters, one for each action type in the
order ALTER, AUDIT, COMMENT, DELETE, GRANT, INDEX, INSERT,
LOCK, RENAME, SELECT, UPDATE, REFERENCES, and EXECUTE).
Positions 14, 15, and 16 are reserved for future use. The characters are:

• - - None
• S - Success
• F - Failure
• B - Both

Page 3 of 6
GDLS Sensitive – Not for distribution outside of GDLS
Printed copy valid for three (3) business days. See the process repository for current version.
Oracle eBusiness Database Monitoring Procedure Published: 12/16/2020

Column NULL Description

AUDIT_OPTION Auditing option set with the AUDIT statement

SES_ACTIONS Session summary (a string of 16 characters, one for each action type in the
order ALTER, AUDIT, COMMENT, DELETE, GRANT, INDEX, INSERT,
LOCK, RENAME, SELECT, UPDATE, REFERENCES, and EXECUTE).
Positions 14, 15, and 16 are reserved for future use. The characters are:

• - - None
• S - Success
• F - Failure
• B - Both

LOGOFF_TIME Date and time of user log off

LOGOFF_LREA Logical reads for the session


D

LOGOFF_PREA Physical reads for the session


D

LOGOFF_LWRIT Logical writes for the session


E

LOGOFF_DLOC Deadlocks detected during the session


K

COMMENT_TEX Text comment on the audit trail entry, providing more information about the
T statement audited

Also indicates how the user was authenticated. The method can be one of
the following:

• DATABASE - Authentication was done by password


• NETWORK - Authentication was done by Oracle Net Services or the
Advanced Security option
• PROXY - Client was authenticated by another user; the name of the
proxy user follows the method type

SESSIONID NOT Numeric ID for each Oracle session


NULL

ENTRYID NOT Numeric ID for each audit trail entry in the session
NULL

STATEMENTID NOT Numeric ID for each statement run


NULL

Page 4 of 6
GDLS Sensitive – Not for distribution outside of GDLS
Printed copy valid for three (3) business days. See the process repository for current version.
Oracle eBusiness Database Monitoring Procedure Published: 12/16/2020

RETURNCODE NOT Oracle error code generated by the action. Some useful values:
NULL
• 0 - Action succeeded
• 2004 - Security violation
• 1017 - invalid username/password
• 28000 - account is locked out

PRIV_USED System privilege used to execute the action

CLIENT_ID Client identifier in each Oracle session

ECONTEXT_ID Application execution context identifier

SESSION_CPU Amount of CPU time used by each Oracle session

EXTENDED_TIM Timestamp of the creation of the audit trail entry (timestamp of user login for
ESTAMP entries created by AUDIT SESSION) in UTC (Coordinated Universal Time)
time zone

PROXY_SESSIO Proxy session serial number, if an enterprise user has logged in through the
NID proxy mechanism

GLOBAL_UID Global user identifier for the user, if the user has logged in as an enterprise
user

INSTANCE_NU Instance number as specified by the INSTANCE_NUMBER initialization


MBER parameter

OS_PROCESS Operating System process identifier of the Oracle process

TRANSACTIONI Transaction identifier of the transaction in which the object is accessed or


D modified

SCN System change number (SCN) of the query

SQL_BIND Bind variable data of the query

SQL_TEXT SQL text of the query

OBJ_EDITION_ Name of the edition containing the audited object


NAME

DBID Database identifier of the audited database

2.3 Outputs

Item Description
VLOOKUP between Activity File and PMP U:\GDLS_Global Transfer\NON-Technical
File Data\Compliance\eBusiness Database Logging
Updated Baseline Spreadsheet U:\GDLS_Global Transfer\NON-Technical
Data\Compliance\eBusiness Database Logging
GDLS Security Incident Database https://thehive.gdls.com:9443

Page 5 of 6
GDLS Sensitive – Not for distribution outside of GDLS
Printed copy valid for three (3) business days. See the process repository for current version.
Oracle eBusiness Database Monitoring Procedure Published: 12/16/2020

2.4 Exceptions
None

3. Definitions
Term Definition

4. Appendices / References
Document Name Comments
Cybersecurity Maturity Model Certification Control Reference AU.2.042, AU.3.045
(CMMC) Ver.1.02
Security Incident Response Procedure

5. Revision History
Date Issue No. Comments Author Approved By:
12/11/2020 1.0 Final Draft L. North
J. Hand
M. Cruz
D. Blaine
G. Perez

Page 6 of 6
GDLS Sensitive – Not for distribution outside of GDLS
Printed copy valid for three (3) business days. See the process repository for current version.

You might also like